Description
A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network.
Reserved 2024-10-10 | Published 2025-05-07 | Updated 2025-05-07 | Assigner
ciscoHIGH: 7.4CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Problem types
Buffer Access with Incorrect Length Value
Product status
16.10.1
affected
16.10.1a
affected
16.10.1b
affected
16.10.1s
affected
16.10.1c
affected
16.10.1e
affected
16.10.1d
affected
16.10.2
affected
16.10.1f
affected
16.10.1g
affected
16.10.3
affected
16.11.1
affected
16.11.1a
affected
16.11.1b
affected
16.11.2
affected
16.11.1s
affected
16.12.1
affected
16.12.1s
affected
16.12.1a
affected
16.12.1c
affected
16.12.1w
affected
16.12.2
affected
16.12.1y
affected
16.12.2a
affected
16.12.3
affected
16.12.8
affected
16.12.2s
affected
16.12.1x
affected
16.12.1t
affected
16.12.4
affected
16.12.3s
affected
16.12.3a
affected
16.12.4a
affected
16.12.5
affected
16.12.6
affected
16.12.1z1
affected
16.12.5a
affected
16.12.5b
affected
16.12.1z2
affected
16.12.6a
affected
16.12.7
affected
16.12.9
affected
16.12.10
affected
16.12.10a
affected
16.12.11
affected
16.12.12
affected
17.1.1
affected
17.1.1a
affected
17.1.1s
affected
17.1.1t
affected
17.1.3
affected
17.2.1
affected
17.2.1r
affected
17.2.1a
affected
17.2.1v
affected
17.2.2
affected
17.2.3
affected
17.3.1
affected
17.3.2
affected
17.3.3
affected
17.3.1a
affected
17.3.1w
affected
17.3.2a
affected
17.3.1x
affected
17.3.1z
affected
17.3.4
affected
17.3.5
affected
17.3.4a
affected
17.3.6
affected
17.3.4b
affected
17.3.4c
affected
17.3.5a
affected
17.3.5b
affected
17.3.7
affected
17.3.8
affected
17.3.8a
affected
17.4.1
affected
17.4.2
affected
17.4.1a
affected
17.4.1b
affected
17.4.2a
affected
17.5.1
affected
17.5.1a
affected
17.6.1
affected
17.6.2
affected
17.6.1w
affected
17.6.1a
affected
17.6.1x
affected
17.6.3
affected
17.6.1y
affected
17.6.1z
affected
17.6.3a
affected
17.6.4
affected
17.6.1z1
affected
17.6.5
affected
17.6.6
affected
17.6.6a
affected
17.6.5a
affected
17.6.7
affected
17.6.8
affected
17.6.8a
affected
17.7.1
affected
17.7.1a
affected
17.7.1b
affected
17.7.2
affected
17.10.1
affected
17.10.1a
affected
17.10.1b
affected
17.8.1
affected
17.8.1a
affected
17.9.1
affected
17.9.1w
affected
17.9.2
affected
17.9.1a
affected
17.9.1x
affected
17.9.1y
affected
17.9.3
affected
17.9.2a
affected
17.9.1x1
affected
17.9.3a
affected
17.9.4
affected
17.9.1y1
affected
17.9.5
affected
17.9.4a
affected
17.9.5a
affected
17.9.5b
affected
17.9.5e
affected
17.9.5f
affected
17.11.1
affected
17.11.1a
affected
17.12.1
affected
17.12.1w
affected
17.12.1a
affected
17.12.1x
affected
17.12.2
affected
17.12.3
affected
17.12.2a
affected
17.12.1y
affected
17.12.1z
affected
17.12.4
affected
17.12.3a
affected
17.12.1z1
affected
17.12.4a
affected
17.12.4b
affected
17.13.1
affected
17.13.1a
affected
17.14.1
affected
17.14.1a
affected
17.11.99SW
affected
17.15.1
affected
17.15.1w
affected
17.15.1a
affected
17.15.1b
affected
References
sec.cloudapps.cisco.com/...ory/cisco-sa-ewlc-cdp-dos-fpeks9K (cisco-sa-ewlc-cdp-dos-fpeks9K)
cve.org (CVE-2025-20202)
nvd.nist.gov (CVE-2025-20202)
Download JSON